Cracking WEP Keys

Cracking WEP Keys

Black Hat via YouTube Direct link

PRNG Use Reduces Entropy

13 of 26

13 of 26

PRNG Use Reduces Entropy

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cracking WEP Keys

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Talk overview
  3. 3 Why Perform Dictionary attacks on WEP?
  4. 4 Wired Equivalent Privacy
  5. 5 WEP Encryption
  6. 6 WEP Authentication
  7. 7 128-bit Variant
  8. 8 WEP Keying
  9. 9 Key Entry Example
  10. 10 64-bit key Generator
  11. 11 64-bit Generator Flawed!
  12. 12 ASCI Mapping Reduces Entropy
  13. 13 PRNG Use Reduces Entropy
  14. 14 Entropy of 64-bit Generator is 21-bits
  15. 15 128-bit Generator
  16. 16 Designed and implemented a WEP Cracker
  17. 17 Structure of WEP Cracker
  18. 18 Packet Collector
  19. 19 Making Guesses
  20. 20 Mapping Guesses to Keys
  21. 21 Key Verification
  22. 22 Results
  23. 23 Brute Force of Keys
  24. 24 Implications
  25. 25 Related work - Bad News
  26. 26 That's All Folks...

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.